Binary Defense Blog

Read the latest cybersecurity news and insights from our industry experts

Featured Post


Detecting Ransomware’s Stealthy Boot Configuration Edits

Written By: Binary Defense Threat Researcher @shade_vx This blog post focuses on threat hunting …

Subscribe to the Blog

View All Posts

Using Microsoft Sentinel to Detect Confluence CVE-2022-26134 Exploitation  

By Akshay Rohatgi and Randy Pargman About this Student Research Project Binary Defense’s mission is to make the …


Russia may be Pressing Arrested Cyber Criminals into Service

Since early 2022, events have been changing dramatically in cyberspace. We can divide these events into before and …


Get To Know Bob Meindl, Our New CEO! 

In May of this year, we announced that well-known cybersecurity expert, Bob Meindl, joined Binary Defense as the …


Detecting Follina Exploits Using a Remote Answer File 

By: Matt Ehrnschwender (@M_alphaaa)  A vulnerability in the Microsoft Support Diagnostic Tool (MSDT), dubbed “Follina” (CVE-2022-30190) has been …


4 Tactics to Detect & Contain Emotet’s Latest Evolution 

Emotet’s latest evolution is bypassing old detection techniques.   In Mid-April, the Emotet botnet significantly increased its volume …


War in Ukraine and Its Impact on Hackers

The Russian invasion of Ukraine started on February 24th, and no one was left indifferent. Cybercriminals are divided …